Enabled/Disabled Predicate Encryption in Clouds

6 downloads 15689 Views 7MB Size Report
Background. Types of Predicate Encryptions. Cloud Storage. Server. (1) {Encrypted Data}. Secret Key. Owner. (2) Token. (3) Results of Search. (1) {Encrypted ...
Enabled/Disabled Predicate Encryption in Clouds Shi-Yuan Huang, Chun-I Fan∗ , and Yi-Fan Tseng Applied Cryptology Laboratory Department of Computer Science and Engineering National Sun Yat-sen University

Future Generation Computer Systems, 2016

1 / 53

Outline

Background Controllable Predicate Encryption Schemes Application I: Secure Webmail Service with Search Privacy Protection Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Conclusion

2 / 53

Definition

Predicate Encryption Predicate encryption is a cryptographic primitive that provides fine-grained control over access to encrypted data. It is often used for encrypted data search in a cloud storage environment.

3 / 53

Background

Data Keyword

Matched Data

Know Everything

No Encryption

Cipheretxts

Keyword

Cannot Search in Ciphertext Space

Using Typical Encryption

Cipheretxts

Search Token Using Predicate Encryption

Matched Ciphertext

Know Nothing

4 / 53

Background How to Search?

Cipheretxts

Search Token Matched Ciphertext

Using Predicate Encryption

Know Nothing

Attributes {0,1} or

embed Ciphertexts

Matched Ciphertext

Search Token

Search Procedure

embed {0,1} or

Attributes

5 / 53

Background Types of Predicate Encryptions

(1) {Encrypted Data}

(2) Token

Secret Key Owner

∈ Condition c

(3) Results of Search ∈ Condition c Cloud Storage Server

Symmetric Setting (2) Token ∈ Condition c (1) {Encrypted Data}

Sender

(3) Results of Search ∈ Condition c Cloud Storage Server

Private Key Owner

Asymmetric Setting

6 / 53

Background Relation of Functional Encryptions

with attribute-hiding

IPE: FE

Attributes

Cover

IBE

PE

ሺܼ௣ ሻ݊

ABE

ሺܼ௣ ሻ݊

If attribute = ID Can be constructed by

HVE: HVE

Attributes {0,1}* {0,1}* (Efficiency)

(Generalization)

IPE

Hierarchical architecture

HIPE (often using dual pairing vector spaces) Notations:  FE: Functional Encryption  IBE: ID-Based Encryption  PE: Predicate Encryption  ABE: Attribute-Based Encryption  HVE: Hidden Vector Encryption  IPE: Inner Product Encryption  HIPE: Hierarchical IPE

7 / 53

Background Hidden Vector Encryption (HVE)

Attributes {0,1}

=

embed Ciphertexts

Matched Ciphertext

Search Token

Search Procedure

embed {0,1}

Attributes

Hidden Vector Encryption (HVE)

Attributes {0,1}

embed Ciphertexts

Inner Product = 0

Matched

8 / 53

Search Token Background Inner Product Encryption (IPE )

Search Procedure

embed {0,1}

Hidden Vector Encryption (HVE)

Attributes Attributes ሺܼ௣ ሻ݊

embed

Inner Product = 0

Ciphertexts

Matched Ciphertext

Search Token

Search Procedure

embed ሺܼ௣ ሻ݊

Attributes

Inner Product Encryption (IPE )

9 / 53

Contributions

Controllable Predicate Encryption for Inner Product Predicates Apply it to Ciphertexts

Search Result

Secure Webmail Service with Search Privacy Protection

System Implementation Sender

Receiver (Private Key Owner)

Public Cloud

Properties:  Timed-Release Services  Data Self-Destruction  Supporting Long Message Encryption  Undecryptable Search Applications:  Encrypted Web-Mail Search  Sender/Receiver Applications Apply it to Ciphertexts Search Token

Public Cloud

Secret Key Owner Search (Manager) Result

Delegated Person (Staff)

Business Data Storage System Supporting Privacy Enhanced Search in Cloud

System Implementation

Properties for Symmetric Setting:  Revocable Delegated Search  Undecryptable Delegated Search Applications:  Delegation-Based Business Applications

10 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates

Proposed Scheme It is the first work that can provide timed-release services and data self-destruction property T1 Receiver R Timed-release Agent TRA

T2 Unreadable

T3 Readable Timed-release Token

Time Unreadable Cannot Retrieve

Distributed Hash Table (DHT)

T1: The sender sets the readable time T2 and the unreadable time T3 for a file. Initially, the file is unreadable for R after it is sent at time T1. T2: TRA publishes the timed-release token at time T2; R can read the file after T2. T3: The file becomes unreadable again after T3.

11 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates

Extended Scheme The extended scheme provides not only timed-release services and data self-destruction but also long message encryption and undecryptable search The length of encrypted messages does not depend on the order of the group The cloud server can obtain only the matched ciphertexts after the search

Encryption

Ciphertext

M  GT, Ppub, PK, Attribute x, T

Encryption

Ciphertext

M  {0, 1}*, Ppub, PK, Attribute x, T

Cloud Server

Decryption Plaintext

Cloud Server

Test Matched Ciphertext Decryption Plaintext

Private Key  Owner

12 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Overview of Controllable Predicate Encryption Scheme

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

SK, Attribute y

Token Gen.

PK

Search Token Time Release Token

...

Senders

SK

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

13 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Overview of Controllable Predicate Encryption Scheme – Timed-Release Services

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

SK

SK, Attribute y

Token Gen.

PK

Search Token Time Release Token

...

Senders

Timed-Release Services

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

14 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Overview of Controllable Predicate Encryption Scheme – Data Self-Destruction

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

Search Token Time Release Token

...

Data Self-Destruction

SK, Attribute y

Token Gen.

PK

Senders

SK

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

15 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Overview of Controllable Predicate Encryption Scheme – Data Self-Destruction

Distributed Hash Table (DHT) A DHT is a distributed, peer-to-peer (P2P) storage network consisting of multiple participating nodes. Numerous DHTs exist on the Internet, including Vuze, Mainline, and KAD. Vanishing Data Object (VDO) availability in the Vuze-based Vanish system This figure shows that for VDOs with N = 50 (shares) and threshold of 90 percent, the probability of premature destruction and prolonged availability both become vanishingly small (< 10−3 ).

16 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Generate Timed Release Token

The agent generates a timed-release token TRTokenT = gTw , where gT = H1 (T ) The agent will publish TRTokenT at time T Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

SK, Attribute y

Token Gen.

PK

Search Token Time Release Token

...

Senders

SK

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

17 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Encryption

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

SK, Attribute y

Search Token Time Release Token

...

Data Self-Destruction

SK

Token Gen.

PK

Senders

Timed-Release Services

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

18 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Encryption

Input: A message M ∈ GT , an attribute vector x 0 = (x10 , x20 , ..., xn0 ) ∈ (Zp )n , PK , Ppub , and T (or gT ). Output: Vanishing data object VDO. 1

Randomly select si in Zp for 1 ≤ i ≤ 4.

2

Randomly choose two random keys K and K 0 ∈ GT , where K ⊕ K 0 = K¯ .

3

Compute the ciphertext: CT = Encryption(PK , x 0 , M, gT , Ppub ) as follows: g1s2 , g3s1 , {C1,i , C2,i }ni=1 , {C3,i , C4,i }ni=1 , H (K ,M)

Ω = F −s2 · K · e(Ppub · g1 2 , gT H3 (K ,M) )−1 , Θ = M ⊕ H4 (K¯ ), H (K ,M) H (K ,M) Q1 = g1 3 , Q2 = gT 2 , where x 0 s3

s1 s2 , C2,i = X2,i · Y2,i · ∆2i

xi0 s4

s1 s2 , C4,i = V2,i · W2,i · Λ2i

s1 s2 C1,i = X1,i · Y1,i · ∆1i s1 s2 C3,i = V1,i · W1,i · Λ1

x 0 s3 x 0 s4

, .

19 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Encryption 4 5

6 7 8

Randomly choose random numbers (α0 , α1 , ..., αt−1 , β0 , β1 , ..., βt−1 ) in Zp , where t is a threshold value. Generate two polynomials as follows: Poly1 (γ) = αt−1 γ t−1 + ... + α1 γ + Θ mod p Poly2 (γ) = βt−1 γ t−1 + ... + β1 γ + K 0 mod p and compute n˜ pairs of shares for [Poly1 (γ), Poly2 (γ)]. Use a cryptographically secure pseudorandom number generator with key K to generate n˜ indices (I1 , I2 , ..., In˜). Sprinkle n˜ pairs of shares at these locations (I1 , I2 , ..., In˜) throughout the DHT. The vanishing data object VDO consists of (g1s2 , g3s1 , {C1,i , C2,i }ni=1 , {C3,i , C4,i }ni=1 , Ω, Q1 , Q2 , t, n˜). VDO will be sent to the cloud server.

Cloud

VDO

K

Locator



……



Shares of

Sender θ K’

Distributed Hash Table (DHT) in P2P Network

pairs 20 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Token Generation

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

SK, Attribute y

Token Gen.

PK

Search Token Time Release Token

...

Senders

SK

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

21 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Token Generation

Input: SK and a vector y 0 = (y10 , y20 , ..., yn0 ) ∈ (Zp )n . Output: A search token Ky 0 relative to y 0 . 1

Randomly choose a1 , a2 , {bi }ni=1 , {ci }ni=1 in Zp .

2

Compute the search token as follows: {K1,i , K2,i , K3,i , K4,i }ni=1 , Qn −y −y −w −w KA = g4 · i=1 K1,i 1,i · K2,i 2,i · K3,i 1,i · K4,i 2,i , Qn −(bi +ci ) , KB = i=1 g2 where −δ2 ·bi

K1,i = g2

δ ·bi

K2,i = g2 1 K3,i = K4,i = 3

a ·yi0 ·x2,i

g2 1

−a1 ·yi0 ·x1,i

g2

, ,

0 −λ ·c a ·y ·v g2 2 i g2 2 i 2,i , 0 λ ·c −a ·y ·v g2 1 i g2 2 i 1,i .

The private key owner sends the search token to the cloud server.

22 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Decryption

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Timed-Release Services

Key Generation

SK, Attribute y Inner Product = 0 or != 0

Token Gen.

PK

Search Token Time Release Token

...

Senders

SK

Encryption

Decryption Cloud Server

Ciphertext

M, PK, Attribute x, T

Obtain M /⊥

Partial Key and Partial Ciphertext

Data Self-Destruction

Distributed Hash Table (DHT) in P2P Network

Partial Key and Partial Ciphertext

23 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Decryption

Input: (VDO, Ky 0 , TRTokenT , Ppub ). Output: M or ⊥. 1 The agent publishes TRTokenT in a bulletin board at time T . 2 Download TRTokenT and verify e(Ppub , H1 (T )) = e(g1 , TRTokenT ). 3

Receive a search token Ky from the private key owner, and then compute Kˆ = Dec(VDO, Ky , TRTokenT ) = Ω · e(Q1 , TRTokenT )· e(Q1 , Q2 )· s2 s1 e(g Qn 1 , KA ) · e(g3 , KB )· i=1 e(C1,i , K1,i ) · e(C2,i , K2,i ) · e(C3,i , K3,i ) · e(C4,i , K4,i ).

24 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Proposed Scheme – Decryption 4

Before the time of data self-destruction, the cloud server can take Kˆ to derive the locations of the shares of K 0 and Θ, and retrieve them.

5 6

Reconstruct two polynomials Poly1 (γ), Poly2 (γ) and get Θ, K 0 . Compute K¯ = Kˆ ⊕ K 0 .

7

ˆ = H4 (K¯ ) ⊕ Θ. Compute M

8

Check Q1 = g1 3

9

ˆ otherwise ⊥. If true, output M = M,

?

ˆ H (Kˆ ,M)

ˆ H (Kˆ ,M)

?

and Q2 = gT 2

Cloud

VDO





Locator

θ K’

M

Receiver





Distributed Hash Table (DHT) in P2P Network

.

K

25 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates – Extended Scheme

Extended Scheme The extended scheme provides not only timed-release services and data self-destruction but also long message encryption and undecryptable search The length of encrypted messages does not depend on the order of the group The cloud server can obtain only the matched ciphertexts after the search

Encryption

Ciphertext

M  GT, Ppub, PK, Attribute x, T

Encryption

Ciphertext

M  {0, 1}*, Ppub, PK, Attribute x, T

Cloud Server

Decryption Plaintext

Cloud Server

Test Matched Ciphertext Decryption Plaintext

Private Key  Owner

26 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates – Extended Scheme Overview of Extended Scheme

Agent (Timed Release Service) Agent.Setup Agent.GenKey

Private Key Owner Obtain M /⊥ (Receiver) Publish Time Release Token at time T

Agent.GenToken

Publish PK Bulletin Board

Key Generation

SK

SK, Attribute y

Token Gen.

PK

Search Token Time Release Token

...

Senders

Decryption

Encryption

Matched Ciphertext Test

Ciphertext

Cloud Server

M, PK, Attribute x, T Partial Key and Partial Ciphertext

Partial Key and Partial Ciphertext Distributed Hash Table (DHT) in P2P Network

27 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Properties Comparisons

 

[4] 

[23] 

[24] 

[25] 

[29] 

[30] 

[31] 

[32] 

[34] 

[39] 

[40] 

Ours 

Timed‐Release Services 

 

 

 

 

 

 

 

 

 

 

 



Data Self‐Destruction 

 

 

 

 

 

 

 

 

 

 

 



Prime Order 





 

 

 









 

 



Inner Product Predicates 

 

 





















No Illegal Access 







 

 

 

 

 





 



Revocable Delegated Search 

 

 

 

 

 

 

 

 

 

 

 



Flexibility (Asymmetric Setting) 

 

















 





§  We can add the following properties in all schemes.  “Supporting Long Message Encryption”, “Undecryptable Search”, “Undecryptable Delegated Search”   

28 / 53

Controllable Predicate Encryption Schemes for Inner Product Predicates Secuirty

Semantic Security Attribute Hiding Timed-Release Property Key Confidentiality

29 / 53

Application I: Secure Webmail Service with Search Privacy Protection

Controllable Predicate Encryption for Inner Product Predicates Apply it to Ciphertexts

Search Result

Secure Webmail Service with Search Privacy Protection

System Implementation Sender

Receiver (Private Key Owner)

Public Cloud

Properties:  Timed-Release Services  Data Self-Destruction  Supporting Long Message Encryption  Undecryptable Search Applications:  Encrypted Web-Mail Search  Sender/Receiver Applications Apply it to Ciphertexts Search Token

Public Cloud

Secret Key Owner Search (Manager) Result

Delegated Person (Staff)

Business Data Storage System Supporting Privacy Enhanced Search in Cloud

System Implementation

Properties for Symmetric Setting:  Revocable Delegated Search  Undecryptable Delegated Search Applications:  Delegation-Based Business Applications

30 / 53

Application I: Secure Webmail Service with Search Privacy Protection Login

This is a web mail system that supports privacy preserving search on encrypted mails.

31 / 53

Application I: Secure Webmail Service with Search Privacy Protection Overview of Implementation

Agent (Timed Release Service) Decryption of Mails

Agent.Setup Agent.GenKey Agent.GenToken

Private Key Owner Obtain M /⊥ (Receiver) Publish Time Release Token at time T Publish PK

Bulletin Board

Key Generation

SK

SK, Attribute y

Token Gen.

PK

Search Token Time Release Token

...

Senders

Decryption

Encryption

Matched Ciphertext Test

Ciphertext

Cloud Server

M, PK, Attribute x, T

Compose Mail and Set Attributes

Results of Search

32 / 53

Application I: Secure Webmail Service with Search Privacy Protection Compose Mail and Set Attributes

33 / 53

Application I: Secure Webmail Service with Search Privacy Protection Results of Search

34 / 53

Application I: Secure Webmail Service with Search Privacy Protection Decryption of Mails

35 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud

Controllable Predicate Encryption for Inner Product Predicates Apply it to Ciphertexts

Search Result

Secure Webmail Service with Search Privacy Protection

System Implementation Sender

Receiver (Private Key Owner)

Public Cloud

Properties:  Timed-Release Services  Data Self-Destruction  Supporting Long Message Encryption  Undecryptable Search Applications:  Encrypted Web-Mail Search  Sender/Receiver Applications Apply it to Ciphertexts Search Token

Public Cloud

Secret Key Owner Search (Manager) Result

Delegated Person (Staff)

Business Data Storage System Supporting Privacy Enhanced Search in Cloud

System Implementation

Properties for Symmetric Setting:  Revocable Delegated Search  Undecryptable Delegated Search Applications:  Delegation-Based Business Applications

36 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Properties

We propose a variant of symmetric predicate encryption, which provides controllable privacy preserving search functionalities Revocable delegated search The owner of a cloud storage can easily control the lifetimes of search tokens

Undecryptable delegated search A delegated person cannot decrypt the returned matched ciphertexts even though he has the delegated privilege of search

37 / 53

How to Construct a Symmetric Predicate Encryption from a Asymmetric one (Supporting Revocable Delegated Search and Undecryptable Delegated Search)

Private Key Owner Obtain M /⊥ (Receiver)

Asymmetric Setting

Decryption Publish PK Bulletin Board

Key Generation

SK

SK, Attribute y Ciphertext

Token Gen.

PK

Search Token Test

...

Senders

Encryption

Cloud Server

Ciphertext

M, PK, Attribute x, T

Symmetric Setting

Secret Key Owner Obtain M /⊥ M, SK, Attribute x, T

Key Generation

Decryption SK

SK, Attribute y

Token Gen.

Ciphertext

Search Token Test Encryption

Ciphertext

Cloud Server 38 / 53

How to Construct a Symmetric Predicate Encryption from a Asymmetric one (Supporting Revocable Delegated Search and Undecryptable Delegated Search)

Secret Key Owner (Manager) Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

39 / 53

How to Construct a Symmetric Predicate Encryption from a Asymmetric one (Supporting Revocable Delegated Search and Undecryptable Delegated Search)

Undecryptable Delegated Search Secret Key Owner (Manager) Key Generation Token  Generation

Revocable Delegated Search

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Decryption Token

Test (Search) Commitment of Search Token

{M}

40 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Login

41 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Implementation Model

It is implemented in the CHT hicloud system. Secret Key Owner (Manager)

Private Cloud Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Public Cloud Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

42 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Private Cloud – Encryption, Token Generation

Secret Key Owner (Manager)

Private Cloud Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Public Cloud Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

43 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Private Cloud – Encryption, Token Generation

Secret Key Owner (Manager)

Private Cloud Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Public Cloud Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

44 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Private Cloud – Encryption, Token Generation

Set Attributes of Ciphertext

45 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Private Cloud – Encryption, Token Generation

Set Attributes of Token

46 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Public Cloud – Search, Decryption

Secret Key Owner (Manager)

Private Cloud Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Public Cloud Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

47 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Public Cloud – Search, Decryption

Secret Key Owner (Manager)

Private Cloud Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Public Cloud Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

48 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Public Cloud – Search, Decryption

49 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Private Cloud – Revocation of Search Token

Secret Key Owner (Manager)

Private Cloud Key Generation Token  Generation

SK SK, Vector y Search Token & Decryption Token

M, SK, Vector x Encryption Ciphertext CT

Delegated Person (Staff)

Public Cloud Cloud Server

Search Token & Decryption Token Query (Generate Query by Using Search Token) Matched Ciphertexts

Decryption

Test (Search)

Decryption Token {M}

50 / 53

Application II: Business Data Storage System Supporting Privacy Enhanced Search in Cloud Private Cloud – Revocation of Search Token

51 / 53

Conclusion

We proposed controllable predicate encryption schemes These are the first works that can provide: Timed-Release Services Data Self-Destruction Long Message Encryption Undecryptable Search Revocable Delegated Search Undecryptable Delegated Search

Applications Secure Webmail Service with Search Privacy Protection Business Data Storage System Supporting Privacy Enhanced Search in Cloud

In future works, we hope to develop controllable predicate encryption schemes supporting privacy homomorphic operations on ciphertexts

52 / 53

               

                    53 / 53